本能 发表于 2025-3-25 05:40:22

Mark Stamp,Corrado Aaron Visaggio,Fabio Di TroiaPresents new and novel applications for AI technology within the context of cybersecurity.Explores and conquers issues and obstacles that the AI field is tackling within the context of cybersecurity.T

plasma 发表于 2025-3-25 11:25:43

Advances in Information Securityhttp://image.papertrans.cn/b/image/162364.jpg

chandel 发表于 2025-3-25 15:01:09

https://doi.org/10.1007/978-1-349-15821-8samples. While the AC-GAN generated images often appear to be very similar to real malware images, we conclude that from a deep learning perspective, the AC-GAN generated samples do not rise to the level of deep fake malware images.

小臼 发表于 2025-3-25 17:43:10

https://doi.org/10.1007/978-3-031-40419-1ation algorithms, we used and compared Support Vector Machines (SVM), Logistic Regression, Random Forests, and Multi-Layer Perceptron (MLP). We found that the classification accuracy obtained by the word embeddings generated by BERT is effective in detecting malware samples, and superior in accuracy when compared to the ones created by Word2Vec.

滔滔不绝的人 发表于 2025-3-25 20:17:04

http://reply.papertrans.cn/17/1624/162364/162364_25.png

Ancillary 发表于 2025-3-26 01:11:22

BERT for Malware Classificationation algorithms, we used and compared Support Vector Machines (SVM), Logistic Regression, Random Forests, and Multi-Layer Perceptron (MLP). We found that the classification accuracy obtained by the word embeddings generated by BERT is effective in detecting malware samples, and superior in accuracy when compared to the ones created by Word2Vec.

instulate 发表于 2025-3-26 08:15:41

http://reply.papertrans.cn/17/1624/162364/162364_27.png

摇摆 发表于 2025-3-26 11:58:56

Assessing the Robustness of an Image-Based Malware Classifier with Smali Level Perturbations Techniqtector and evaluate its resilience when morphed samples are considered. The experiments were conducted on 16384 real-world Android Malware, and the experimental analysis demonstrates that standard image-based malware classifiers are vulnerable to simple perturbations attacks.

含水层 发表于 2025-3-26 15:41:13

http://reply.papertrans.cn/17/1624/162364/162364_29.png

ostracize 发表于 2025-3-26 17:53:19

http://reply.papertrans.cn/17/1624/162364/162364_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Artificial Intelligence for Cybersecurity; Mark Stamp,Corrado Aaron Visaggio,Fabio Di Troia Book 2022 The Editor(s) (if applicable) and Th